Multimedia Multicast on the Internet 2007
DOI: 10.1002/9780470612040.ch2
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical Multicast Protocols with Quality of Service

Abstract: Multimedia applications vary radically from the traditional applications of data transfers such as email or file transfer. Indeed, these applications generally concern only two users: a source and a destination. In addition, the transmission delays do not influence the service. On the contrary, multimedia applications can imply more than two users (a videoconference for 100 people for example). In addition, these applications need short delays and flow guarantees in order to ensure a continuous playback of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 32 publications
0
13
0
Order By: Relevance
“…It is bidirectional because there is no distinction between sources and receivers. The core based tree (CBT) [2] and PIM Sparce Mode (PIM-SM) [7] are well known examples of shared tree protocol. Bach sender transmits messages to the multicast group toward the core.…”
Section: Qos and Multicast Overviewmentioning
confidence: 99%
See 1 more Smart Citation
“…It is bidirectional because there is no distinction between sources and receivers. The core based tree (CBT) [2] and PIM Sparce Mode (PIM-SM) [7] are well known examples of shared tree protocol. Bach sender transmits messages to the multicast group toward the core.…”
Section: Qos and Multicast Overviewmentioning
confidence: 99%
“…The first one is called RDV (RenDezVous) hierarchical architecture and the second LDS (Link Direct Shortest path) hierarchical architecture. Complete description and algorithms of these two methods can be found in [2].…”
Section: Hierarchical Tree Construction Between Serversmentioning
confidence: 99%
“…100 Mbps. The consumed bandwidth of link e i 2 E prior to NCM is randomly generated in the range [1,50] Mbps with a uniform distribution. The bandwidth consumption of each link in NCM subgraph is set to 30 Mbps.…”
Section: Test Instancesmentioning
confidence: 99%
“…Multicast is one of the efficient technologies developed for supporting one-to-many multimedia applications with stringent quality-of-service (QoS). Therefore, this technology has drawn significant amount of research attention from both academia and industry [1]. Unfortunately, multicast with store-and-forward strategy cannot guarantee that a theoretical maximal throughput is always obtained.…”
Section: Introductionmentioning
confidence: 99%
“…Network coding is featured with a number of outstanding advantages, such as natural load balancing, robustness against network failures, stable resistance to attacks, energy saving in multi-hop wireless networks, and so on [1]. Multicast is a technology for point to multi-point data transmission, where the source expects to deliver identical data to a set of receivers [2]. Network coding, when applied to multicast, can always enable the achievement of theoretically maximized throughput [3].…”
Section: Introductionmentioning
confidence: 99%